Ronald L. Rivest
Orcid: 0000-0002-7105-3690Affiliations:
- MIT, Internet Policy Research Initiative, USA
According to our database1,
Ronald L. Rivest
authored at least 201 papers
between 1972 and 2024.
Collaborative distances:
Collaborative distances:
Awards
Turing Prize recipient
Turing Prize 2002, "For RSA (algorithm)|their ingenious contribution for making public-key cryptography useful in practice." awarded to Ronald L. Rivest and Adi Shamir and Leonard M. Adleman.
ACM Fellow
ACM Fellow 1994, "For contributions to the field of cryptography.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
CoRR, 2024
2022
IACR Cryptol. ePrint Arch., 2022
2021
J. Cybersecur., 2021
Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections.
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021
2020
SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol.
CoRR, 2020
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
2019
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits.
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
2018
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 2018
2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015
2014
2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Turing Centenary Celebration, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Int. J. Comput. Math., 2011
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Electronic Voting 2010, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
2007
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the Theoretical Computer Science, 2006
2005
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005
2004
Concurr. Pract. Exp., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the Pervasive Computing, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Introduction to Algorithms, Second Edition
The MIT Press and McGraw-Hill Book Company, ISBN: 0-07-013151-1, 2001
2000
RC6 as the AES.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer.
J. Cryptol., 1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Financial Cryptography, 1998
1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997
IACR Cryptol. ePrint Arch., 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the Financial Cryptography, 1997
Proceedings of the Financial Cryptography, 1997
1996
Proceedings of the Security Protocols, 1996
1995
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
Inf. Comput., September, 1993
Proceedings of the Fourth Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1993
Proceedings of the Machine Learning: From Theory to Applications, 1993
1992
1991
Inf. Comput., January, 1991
Proceedings of the Advances in Neural Information Processing Systems 4, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Neural Information Processing Systems 3, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Third Annual Workshop on Computational Learning Theory, 1990
Proceedings of the Third Annual Workshop on Computational Learning Theory, 1990
Cryptography.
Proceedings of the Handbook of Theoretical Computer Science, 1990
1989
Inf. Comput., March, 1989
Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Introduction to Algorithms
The MIT Press and McGraw-Hill Book Company, ISBN: 0-07-013143-0, 1989
1988
IEEE Trans. Inf. Theory, 1988
SIAM J. Comput., 1988
J. Cryptol., 1988
A New Model for Inductive Inference.
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, 1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988
Proceedings of the First Annual Workshop on Computational Learning Theory, 1988
Proceedings of the 7th National Conference on Artificial Intelligence, 1988
1987
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987
1986
J. ACM, 1986
Proceedings of the UAI '86: Proceedings of the Second Annual Conference on Uncertainty in Artificial Intelligence, 1986
1985
Proceedings of the Automata, 1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1984
Proceedings of the 25th Annual Symposium on Foundations of Computer Science, 1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
Proceedings of the Advances in Cryptology, 1984
1983
Commun. ACM, 1983
Proceedings of the 24th Annual Symposium on Foundations of Computer Science, 1983
Proceedings of the Fundamentals of Computation Theory, 1983
1982
Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982
An Application of Number Theory to the Organization of Raster-Graphics Memory (Extended Abstract)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1982
Proceedings of the 19th Design Automation Conference, 1982
Proceedings of the 19th Design Automation Conference, 1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982
1981
1980
1979
An Omega(n/lg n)<sup>1/2</sup> Lower Bound on the Number of Additions Necessary to Compute 0-1 Polynomials over the Ring of Integer Polynomials.
Inf. Process. Lett., 1979
1978
Cryptologia, 1978
Commun. ACM, 1978
Proceedings of the 10th Annual ACM Symposium on Theory of Computing, 1978
1977
IEEE Trans. Computers, 1977
Proceedings of the 9th Annual ACM Symposium on Theory of Computing, 1977
1976
Proceedings of the 17th Annual Symposium on Foundations of Computer Science, 1976
1975
The Algorithm SELECT - for Finding the ith Smallest of n Elements [M1] (Algorithm 489).
Commun. ACM, 1975
Proceedings of the 7th Annual ACM Symposium on Theory of Computing, 1975
1974
On the Optimality of Elia's Algorithm for Performing Best-Match Searches.
Proceedings of the Information Processing, 1974
Proceedings of the 15th Annual Symposium on Switching and Automata Theory, 1974
1973
1972
Proceedings of the 4th Annual ACM Symposium on Theory of Computing, 1972